ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 1)

Publication Date:

Authors : ;

Page : 286-291

Keywords : :Email Security; Spoofing;

Source : Downloadexternal Find it from : Google Scholarexternal


Spoofing is a very common security threat to email applications. Several powerful techniques have been developed to counteract spoofing, but most of them are server-oriented and transparent to the user. Making up for the vast majority of emails transmitted, spam is an annoyance and potential security issue for users, and moreover a superfluous burden to the internet. Despite the maturity of today’s email infrastructure, it is difficult to ensure the authenticity of a sender address for inbound mails. This shortcoming is used by spammers to bypass existing spam protection systems and furthermore poses a security risk to users. Due to this a vast majority of spam emails today are sent from botnets with forged sender addresses. This has attracted researchers over the years to develop email sender authentication mechanism as a promising way to verify identity of the senders. Therefore an urgent need to new mechanisms to circumvent the spoofing threat.

Last modified: 2015-02-09 21:55:48